Course Information
Cybersecurity: A Guide for Accountants
Course Information
Title: | Cybersecurity: A Guide for Accountants |
---|---|
Category: | Computer Software |
Field of Study: | Information Technology |
Course Code: | M240 |
CPE Credits: | 10.0 |
Price: | 59.95 |
Description
Description:
The ease of access to and rapid flow of information makes cybercrime different from real-world crimes. For example, the transformation of crime with the establishment of the computer and networked technologies leads to the shift of target from more tangible to less tangible forms in values of wealth; from things to ideas expressed in informational sources. Cybersecurity is a complex and ever-changing phenomenon. This course is designed to help you navigate the complexities of this field.
Delivery Method: Online Interactive Self Study
Level: Overview
Prerequisites: None
Advanced Preparation: None
Course Details
Category: Computer Software
Field of Study: Information Technology
Passing Score: 70%
Technical Details: Information technology is a technical subject.
For More Detail:
If you are unable to view PDF then right click the mouse and click save link as
Objectives
Objectives:
Chapter 1: The Evolution of Cybersecurity. Chapter 2: Cybersecurity Threats and Attacks. 1. Recognize common cybersecurity misconceptions 2. Identify the five functions of the NIST Cybersecurity Framework. 3. Recognize the five stages of the ITIL Framework. 4. Identify the main causes for the rise of cyberattacks 5. Recognize common types of cyberattacks. 6. Identify different kinds of cyber threat actors 7. Identify ways to protect yourself against cybercrime. Chapter 3: Governance Process. Chapter 4: Policy Implementation 1. Identify the objectives of IT governance 2. Recognize the role of the board in cybersecurity 3. Identify management activities associated with IT governance. 4. Recognize the key principles of the COBIT Framework 5. Identify must-have security policies for every organization. Chapter 5: Physical and Environmental Protection. Chapter 6: Information Security: 1. Identify the essential physical security measures. 2. Recognize the essential information security measures. 3. Identify cloud computing security measures. 4. Recognize mobile device security best practice. Chapter 7: Regulatory Environment. Chapter 8: Compliance for Healthcare Industry. Chapter 9: Compliance for Financial Institutions. 1. Identify the significant federal regulations of data privacy and protection. 2. Recognize the key provisions of state privacy laws. 3. Identify the key provisions of the HIPAA. 4. Recognize the key requirements of the GLBA
For More Objectives:
If you are unable to view PDF then right click the mouse and click save link as
Profession
NASBA: Yes
QAS: Yes
CPA: Suitable for all CPAs
IRS: IRS credit for Enrolled Agents.
Profession Identifiers: CPA